{"id":28332,"date":"2026-02-21T17:35:31","date_gmt":"2026-02-21T16:35:31","guid":{"rendered":"https:\/\/perseus.de\/case-studies\/"},"modified":"2026-04-02T16:57:34","modified_gmt":"2026-04-02T14:57:34","slug":"case-studies","status":"publish","type":"page","link":"https:\/\/perseus.de\/en\/case-studies\/","title":{"rendered":"Case Studies"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"28332\" class=\"elementor elementor-28332 elementor-25457\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ec52a39 e-flex e-con-boxed e-con e-parent\" data-id=\"ec52a39\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d66c3e4 e-con-full e-flex e-con e-child\" data-id=\"d66c3e4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-417aed6 elementor-widget elementor-widget-heading\" data-id=\"417aed6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Useful information on cyber security, data protection and much more<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0dcf94 elementor-widget elementor-widget-heading\" data-id=\"c0dcf94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Case Studies<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c5ea04 elementor-widget elementor-widget-text-editor\" data-id=\"5c5ea04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"632\" data-end=\"927\">Our <strong data-start=\"636\" data-end=\"698\">case studies in cybersecurity and data protection for SMEs<\/strong> demonstrate how businesses successfully manage real cyber risks. Discover how we identify vulnerabilities, implement effective security measures, and create holistic solutions in collaboration with <strong data-start=\"897\" data-end=\"926\">cyber insurance providers<\/strong>.<\/p><p data-start=\"929\" data-end=\"1098\">Through real-world examples, you gain practical insights into <strong data-start=\"991\" data-end=\"1045\">IT security, GDPR compliance, and cyber resilience<\/strong>\u2014clear, transparent, and applicable to your business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c46bcb e-con-full e-flex e-con e-child\" data-id=\"7c46bcb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26c4f1e elementor-widget elementor-widget-image\" data-id=\"26c4f1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png\" class=\"attachment-large size-large wp-image-28331\" alt=\"Mann und Frau feiern erfolgreiche Partnerschaft im Bereich der IT-Sicherheit\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png 800w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3-768x768.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0aaa61c e-flex e-con-boxed e-con e-parent\" data-id=\"0aaa61c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f65ed90 e-flex e-con-boxed e-con e-parent\" data-id=\"f65ed90\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4ea969f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"4ea969f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Useful information on cyber security, data protection and much more Case Studies Our case studies in cybersecurity and data protection for SMEs demonstrate how businesses successfully manage real cyber risks. Discover how we identify vulnerabilities, implement effective security measures, and create holistic solutions in collaboration with cyber insurance providers. Through real-world examples, you gain practical [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-28332","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity knowledge \u2013 compact, understandable, up-to-date<\/title>\n<meta name=\"description\" content=\"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fallstudien\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity knowledge \u2013 compact, understandable, up-to-date\" \/>\n<meta property=\"og:description\" content=\"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fallstudien\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-02T14:57:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/\",\"name\":\"Cybersecurity knowledge \u2013 compact, understandable, up-to-date\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Headerbild-Partner-Page-V3.png\",\"datePublished\":\"2026-02-21T16:35:31+00:00\",\"dateModified\":\"2026-04-02T14:57:34+00:00\",\"description\":\"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Headerbild-Partner-Page-V3.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/Headerbild-Partner-Page-V3.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fallstudien\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity knowledge \u2013 compact, understandable, up-to-date","description":"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fallstudien\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity knowledge \u2013 compact, understandable, up-to-date","og_description":"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.","og_url":"https:\/\/perseus.de\/fallstudien\/","og_site_name":"Perseus Technologies","article_modified_time":"2026-04-02T14:57:34+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/perseus.de\/fallstudien\/","url":"https:\/\/perseus.de\/fallstudien\/","name":"Cybersecurity knowledge \u2013 compact, understandable, up-to-date","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fallstudien\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fallstudien\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png","datePublished":"2026-02-21T16:35:31+00:00","dateModified":"2026-04-02T14:57:34+00:00","description":"Discover the latest cybersecurity knowledge for SMEs \u2013 tips, damage examples and background information at a glance.","breadcrumb":{"@id":"https:\/\/perseus.de\/fallstudien\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fallstudien\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/fallstudien\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/04\/Headerbild-Partner-Page-V3.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fallstudien\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Case Studies"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages\/28332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=28332"}],"version-history":[{"count":4,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages\/28332\/revisions"}],"predecessor-version":[{"id":28345,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/pages\/28332\/revisions\/28345"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=28332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}